Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
Spedizione.vbs
|
ASCII text, with CRLF line terminators
|
initial sample
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EDVRD.vbs
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\WindowsUpdate\OOWZL.cmd
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\WindowsUpdate\ZARTD.ps1
|
ASCII text, with very long lines (22461), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\raw[1].txt
|
ASCII text, with very long lines (22461), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4fe4qbl4.ul1.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b0lcoy0v.npq.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bmncqhkz.zum.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fa2pokle.tzo.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t4vcqwkf.53t.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z3by4mzh.c0k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsUpdate-JQCXW.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, System, Archive, ctime=Mon
Oct 21 08:17:06 2024, mtime=Mon Oct 21 08:17:06 2024, atime=Mon Oct 21 08:17:06 2024, length=274, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnk
|
MS Windows shortcut, Item id list present, Has Relative path, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600,
atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\WindowsUpdate\PLWAI.tmp
|
ASCII text, with very long lines (46979), with CRLF line terminators
|
dropped
|
There are 7 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Spedizione.vbs"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\WindowsUpdate\OOWZL.cmd" "
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
PowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\Users\user\AppData\Roaming\WindowsUpdate\ZARTD.ps1
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EDVRD.vbs"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\WindowsUpdate\OOWZL.cmd" "
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
PowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\Users\user\AppData\Roaming\WindowsUpdate\ZARTD.ps1
|
||
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
|
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
|
||
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
|
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
|
||
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
|
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
|
||
C:\Windows\System32\wscript.exe
|
"C:\Windows\System32\WScript.exe" "C:\Users\user\Start Menu\Programs\Startup\EDVRD.vbs"
|
||
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
|
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
|
||
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
|
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
|
||
C:\Windows\System32\cmd.exe
|
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\WindowsUpdate\OOWZL.cmd" "
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
PowerShell.exe -NoProfile -ExecutionPolicy Bypass -Command C:\Users\user\AppData\Roaming\WindowsUpdate\ZARTD.ps1
|
||
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
|
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
|
||
C:\Users\user\AppData\Local\Temp\RegSvcs.exe
|
"C:\Users\user\AppData\Local\Temp\RegSvcs.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://rentry.co/m7ebw9yf/raw
|
172.67.75.40
|
||
https://rentry.co/e5cn3isb/raw
|
172.67.75.40
|
||
http://crl.microsZi
|
unknown
|
||
http://crl.m
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://rentry.co/e5cn3isb/rawrams
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://rentry.co/
|
unknown
|
||
https://rentry.co/e5cn3isb/rawFz
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://rentry.co
|
unknown
|
There are 3 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
rentry.co
|
172.67.75.40
|
||
ole.cloudns.ph
|
80.76.51.209
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
80.76.51.209
|
ole.cloudns.ph
|
Bulgaria
|
||
172.67.75.40
|
rentry.co
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\Environment
|
SEE_MASK_NOZONECHECKS
|
||
HKEY_CURRENT_USER
|
di
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
There are 6 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
167E000
|
stack
|
page read and write
|
||
166EAFF000
|
stack
|
page read and write
|
||
25555E2D000
|
heap
|
page read and write
|
||
2555752D000
|
heap
|
page read and write
|
||
7FF849003000
|
trusted library allocation
|
page read and write
|
||
3020000
|
trusted library allocation
|
page read and write
|
||
210B7D50000
|
heap
|
page read and write
|
||
1C925203000
|
heap
|
page read and write
|
||
166E8FE000
|
stack
|
page read and write
|
||
255565A1000
|
heap
|
page read and write
|
||
CA58CFF000
|
stack
|
page read and write
|
||
255535F3000
|
heap
|
page read and write
|
||
32C1000
|
trusted library allocation
|
page read and write
|
||
273A09A0000
|
heap
|
page read and write
|
||
255536AD000
|
heap
|
page read and write
|
||
25553667000
|
heap
|
page read and write
|
||
25553801000
|
heap
|
page read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
1C92349B000
|
heap
|
page read and write
|
||
2BEF000
|
stack
|
page read and write
|
||
1AC3CCF0000
|
heap
|
page execute and read and write
|
||
164F000
|
stack
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
25557870000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
15F0000
|
heap
|
page read and write
|
||
25556804000
|
heap
|
page read and write
|
||
C5BECFE000
|
stack
|
page read and write
|
||
7FF848D4C000
|
trusted library allocation
|
page execute and read and write
|
||
1AC4CDB1000
|
trusted library allocation
|
page read and write
|
||
1C93DF54000
|
heap
|
page read and write
|
||
1C935550000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
E26000
|
heap
|
page read and write
|
||
273B2941000
|
trusted library allocation
|
page read and write
|
||
255539F2000
|
heap
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1C93D6CC000
|
heap
|
page read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
210B7DF4000
|
heap
|
page read and write
|
||
1AC3E7C7000
|
trusted library allocation
|
page read and write
|
||
273A2939000
|
heap
|
page read and write
|
||
1AC54ED0000
|
heap
|
page read and write
|
||
255538E3000
|
heap
|
page read and write
|
||
5F80000
|
heap
|
page execute and read and write
|
||
25557577000
|
heap
|
page read and write
|
||
25557989000
|
heap
|
page read and write
|
||
1680000
|
trusted library allocation
|
page execute and read and write
|
||
25553749000
|
heap
|
page read and write
|
||
25553759000
|
heap
|
page read and write
|
||
25558890000
|
remote allocation
|
page read and write
|
||
1AC3AD40000
|
heap
|
page read and write
|
||
210B7E3C000
|
heap
|
page read and write
|
||
30D0000
|
trusted library allocation
|
page read and write
|
||
273A3C43000
|
trusted library allocation
|
page read and write
|
||
255535C3000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1C925541000
|
trusted library allocation
|
page read and write
|
||
15E0000
|
trusted library allocation
|
page read and write
|
||
1634000
|
trusted library allocation
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
107A000
|
trusted library allocation
|
page execute and read and write
|
||
CA59E4D000
|
stack
|
page read and write
|
||
55EE000
|
stack
|
page read and write
|
||
7FF848E85000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF848E5A000
|
trusted library allocation
|
page read and write
|
||
25553791000
|
heap
|
page read and write
|
||
96A4C7C000
|
stack
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page execute and read and write
|
||
25558890000
|
remote allocation
|
page read and write
|
||
96A523B000
|
stack
|
page read and write
|
||
2B99092E000
|
heap
|
page read and write
|
||
255536D5000
|
heap
|
page read and write
|
||
7FF848DC0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
2B990952000
|
heap
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
58D4000
|
trusted library allocation
|
page read and write
|
||
273A0A75000
|
heap
|
page read and write
|
||
2AA0000
|
trusted library allocation
|
page read and write
|
||
96A5E4E000
|
stack
|
page read and write
|
||
25558780000
|
heap
|
page read and write
|
||
1610000
|
trusted library allocation
|
page read and write
|
||
25557B65000
|
heap
|
page read and write
|
||
A03A77E000
|
stack
|
page read and write
|
||
58A0000
|
trusted library allocation
|
page read and write
|
||
210B7D60000
|
heap
|
page read and write
|
||
210B7DE8000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
255538CB000
|
heap
|
page read and write
|
||
C5BEEFE000
|
stack
|
page read and write
|
||
1682000
|
heap
|
page read and write
|
||
25553741000
|
heap
|
page read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
1AC3D774000
|
trusted library allocation
|
page read and write
|
||
25553947000
|
heap
|
page read and write
|
||
255537AD000
|
heap
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
25553911000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
7FF848CB3000
|
trusted library allocation
|
page execute and read and write
|
||
1350000
|
heap
|
page read and write
|
||
273BAA3A000
|
heap
|
page read and write
|
||
2B990936000
|
heap
|
page read and write
|
||
7FF848D76000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849082000
|
trusted library allocation
|
page read and write
|
||
1C9355B2000
|
trusted library allocation
|
page read and write
|
||
255537E5000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
1C9254D7000
|
heap
|
page execute and read and write
|
||
167E000
|
heap
|
page read and write
|
||
25555C2D000
|
heap
|
page read and write
|
||
1C92354A000
|
heap
|
page read and write
|
||
2D08000
|
trusted library allocation
|
page read and write
|
||
25557544000
|
heap
|
page read and write
|
||
7FF848E6A000
|
trusted library allocation
|
page read and write
|
||
1303000
|
trusted library allocation
|
page execute and read and write
|
||
255538D0000
|
heap
|
page read and write
|
||
1C9254D0000
|
heap
|
page execute and read and write
|
||
1AC3D3CA000
|
trusted library allocation
|
page read and write
|
||
25551668000
|
heap
|
page read and write
|
||
1AC3ACC0000
|
heap
|
page read and write
|
||
E69000
|
heap
|
page read and write
|
||
25558935000
|
heap
|
page read and write
|
||
7FF848E92000
|
trusted library allocation
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
1C9266B1000
|
trusted library allocation
|
page read and write
|
||
25556555000
|
heap
|
page read and write
|
||
25553911000
|
heap
|
page read and write
|
||
10F7000
|
stack
|
page read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
255516D5000
|
heap
|
page read and write
|
||
12EA000
|
trusted library allocation
|
page execute and read and write
|
||
1C9234AE000
|
heap
|
page read and write
|
||
30C0000
|
trusted library allocation
|
page read and write
|
||
1216000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
1AC55420000
|
trusted library section
|
page read and write
|
||
273A09E0000
|
trusted library allocation
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
566E000
|
stack
|
page read and write
|
||
4CDC000
|
stack
|
page read and write
|
||
210B7E4B000
|
heap
|
page read and write
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
2B9908E0000
|
heap
|
page read and write
|
||
210B7DCF000
|
heap
|
page read and write
|
||
595E000
|
stack
|
page read and write
|
||
255535BB000
|
heap
|
page read and write
|
||
CA5A08D000
|
stack
|
page read and write
|
||
210B7DD1000
|
heap
|
page read and write
|
||
1A70000
|
heap
|
page read and write
|
||
E62000
|
heap
|
page read and write
|
||
273A2440000
|
heap
|
page read and write
|
||
16F8000
|
heap
|
page read and write
|
||
96A4BFE000
|
stack
|
page read and write
|
||
1AC4D0C0000
|
trusted library allocation
|
page read and write
|
||
273A43B5000
|
trusted library allocation
|
page read and write
|
||
2AAB000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E61000
|
trusted library allocation
|
page read and write
|
||
7FF848D96000
|
trusted library allocation
|
page execute and read and write
|
||
1466000
|
heap
|
page read and write
|
||
1C923440000
|
heap
|
page read and write
|
||
1AC3CC6E000
|
heap
|
page read and write
|
||
13D5000
|
heap
|
page read and write
|
||
A03A2FD000
|
stack
|
page read and write
|
||
25557512000
|
heap
|
page read and write
|
||
A03A8FC000
|
stack
|
page read and write
|
||
7FF848D86000
|
trusted library allocation
|
page execute and read and write
|
||
1C9275C1000
|
trusted library allocation
|
page read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
7FF848CB2000
|
trusted library allocation
|
page read and write
|
||
25557588000
|
heap
|
page read and write
|
||
2B9909D5000
|
heap
|
page read and write
|
||
25557545000
|
heap
|
page read and write
|
||
255542E6000
|
heap
|
page read and write
|
||
25553675000
|
heap
|
page read and write
|
||
1C92660D000
|
trusted library allocation
|
page read and write
|
||
96A4A7E000
|
stack
|
page read and write
|
||
25555F2D000
|
heap
|
page read and write
|
||
1C93D5D0000
|
heap
|
page read and write
|
||
2555632E000
|
heap
|
page read and write
|
||
255537BD000
|
heap
|
page read and write
|
||
25553761000
|
heap
|
page read and write
|
||
7FF848D46000
|
trusted library allocation
|
page read and write
|
||
25557544000
|
heap
|
page read and write
|
||
1AC3AE13000
|
heap
|
page read and write
|
||
96A5D8D000
|
stack
|
page read and write
|
||
10B7000
|
heap
|
page read and write
|
||
255536C5000
|
heap
|
page read and write
|
||
1C926FF1000
|
trusted library allocation
|
page read and write
|
||
A03A073000
|
stack
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
1AC3D9C3000
|
trusted library allocation
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
2555386D000
|
heap
|
page read and write
|
||
104E000
|
stack
|
page read and write
|
||
16AE000
|
stack
|
page read and write
|
||
255598CD000
|
heap
|
page read and write
|
||
96A5ECC000
|
stack
|
page read and write
|
||
2555172D000
|
heap
|
page read and write
|
||
25553715000
|
heap
|
page read and write
|
||
7FF848E82000
|
trusted library allocation
|
page read and write
|
||
273BAE4E000
|
heap
|
page read and write
|
||
166E2FE000
|
stack
|
page read and write
|
||
273A2B6C000
|
trusted library allocation
|
page read and write
|
||
7FF849074000
|
trusted library allocation
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
7FF8490FB000
|
trusted library allocation
|
page read and write
|
||
25557D53000
|
heap
|
page read and write
|
||
210B7DD0000
|
heap
|
page read and write
|
||
1460000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
25551768000
|
heap
|
page read and write
|
||
1C926FEF000
|
trusted library allocation
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
273BADEA000
|
heap
|
page read and write
|
||
25556801000
|
heap
|
page read and write
|
||
25553774000
|
heap
|
page read and write
|
||
C5BF4FB000
|
stack
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
210B7DBE000
|
heap
|
page read and write
|
||
CA58E7E000
|
stack
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
7FF849010000
|
trusted library allocation
|
page read and write
|
||
7FF848E30000
|
trusted library allocation
|
page read and write
|
||
1C925360000
|
heap
|
page read and write
|
||
156E000
|
stack
|
page read and write
|
||
255538DE000
|
heap
|
page read and write
|
||
25557B65000
|
heap
|
page read and write
|
||
210B7DBC000
|
heap
|
page read and write
|
||
5E34000
|
trusted library allocation
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
7FF848D5C000
|
trusted library allocation
|
page execute and read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
1AC3AE70000
|
trusted library allocation
|
page read and write
|
||
2555622E000
|
heap
|
page read and write
|
||
3D01000
|
trusted library allocation
|
page read and write
|
||
2555380C000
|
heap
|
page read and write
|
||
5C0E000
|
stack
|
page read and write
|
||
25556CFE000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page execute and read and write
|
||
16B2000
|
heap
|
page read and write
|
||
273B2968000
|
trusted library allocation
|
page read and write
|
||
3131000
|
trusted library allocation
|
page read and write
|
||
A03B40E000
|
stack
|
page read and write
|
||
25557200000
|
heap
|
page read and write
|
||
1C925369000
|
heap
|
page read and write
|
||
255516BB000
|
heap
|
page read and write
|
||
3120000
|
heap
|
page execute and read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
25553789000
|
heap
|
page read and write
|
||
7FF848E32000
|
trusted library allocation
|
page read and write
|
||
1AC3CC1A000
|
heap
|
page read and write
|
||
1AC3CFD1000
|
trusted library allocation
|
page read and write
|
||
255566C4000
|
heap
|
page read and write
|
||
7FF8491A7000
|
trusted library allocation
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
300B000
|
trusted library allocation
|
page execute and read and write
|
||
273BB444000
|
heap
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
96A4B7E000
|
stack
|
page read and write
|
||
7FF848E52000
|
trusted library allocation
|
page read and write
|
||
25557934000
|
heap
|
page read and write
|
||
210B7DE4000
|
heap
|
page read and write
|
||
2B99092C000
|
heap
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CB4000
|
trusted library allocation
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
9FB000
|
stack
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
7FF848D56000
|
trusted library allocation
|
page read and write
|
||
589D000
|
stack
|
page read and write
|
||
273A33BE000
|
trusted library allocation
|
page read and write
|
||
1C9270F1000
|
trusted library allocation
|
page read and write
|
||
12CF000
|
stack
|
page read and write
|
||
1C93D793000
|
heap
|
page read and write
|
||
273BAE5D000
|
heap
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
1510000
|
heap
|
page read and write
|
||
2BD0000
|
trusted library allocation
|
page read and write
|
||
255570FE000
|
heap
|
page read and write
|
||
2BC0000
|
trusted library allocation
|
page execute and read and write
|
||
210B7DD7000
|
heap
|
page read and write
|
||
25553947000
|
heap
|
page read and write
|
||
D67000
|
stack
|
page read and write
|
||
1C925F71000
|
trusted library allocation
|
page read and write
|
||
1AC3AF60000
|
heap
|
page read and write
|
||
273A39E1000
|
trusted library allocation
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
210B8035000
|
heap
|
page read and write
|
||
58BB000
|
trusted library allocation
|
page read and write
|
||
CA59E8F000
|
stack
|
page read and write
|
||
7FF849170000
|
trusted library allocation
|
page read and write
|
||
1708000
|
heap
|
page read and write
|
||
A03A0FE000
|
stack
|
page read and write
|
||
25557586000
|
heap
|
page read and write
|
||
2555750E000
|
heap
|
page read and write
|
||
2555362B000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
255537DD000
|
heap
|
page read and write
|
||
30B0000
|
trusted library allocation
|
page execute and read and write
|
||
592D000
|
stack
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
1C923511000
|
heap
|
page read and write
|
||
1697000
|
heap
|
page read and write
|
||
210B7DF4000
|
heap
|
page read and write
|
||
161B000
|
trusted library allocation
|
page execute and read and write
|
||
1C93DA10000
|
heap
|
page read and write
|
||
7FF848E72000
|
trusted library allocation
|
page read and write
|
||
255570FF000
|
heap
|
page read and write
|
||
2555361B000
|
heap
|
page read and write
|
||
1C935568000
|
trusted library allocation
|
page read and write
|
||
C5BF2FE000
|
stack
|
page read and write
|
||
7FF848E7A000
|
trusted library allocation
|
page read and write
|
||
255536A5000
|
heap
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
273A0975000
|
heap
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
25553739000
|
heap
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
255569FE000
|
heap
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
52FE000
|
stack
|
page read and write
|
||
255584D0000
|
heap
|
page read and write
|
||
7FF848CAB000
|
trusted library allocation
|
page read and write
|
||
1AC3D2C4000
|
trusted library allocation
|
page read and write
|
||
30E0000
|
heap
|
page read and write
|
||
2555798A000
|
heap
|
page read and write
|
||
1AC3EB07000
|
trusted library allocation
|
page read and write
|
||
58C0000
|
heap
|
page read and write
|
||
2D01000
|
trusted library allocation
|
page read and write
|
||
25553911000
|
heap
|
page read and write
|
||
255565C5000
|
heap
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
1C9260F1000
|
trusted library allocation
|
page read and write
|
||
556E000
|
stack
|
page read and write
|
||
5950000
|
heap
|
page read and write
|
||
273B30E7000
|
trusted library allocation
|
page read and write
|
||
25557BEE000
|
heap
|
page read and write
|
||
A03A27E000
|
stack
|
page read and write
|
||
5C69000
|
trusted library allocation
|
page read and write
|
||
1AC54F11000
|
heap
|
page read and write
|
||
25556BFD000
|
heap
|
page read and write
|
||
25557AA7000
|
heap
|
page read and write
|
||
1C925FBE000
|
trusted library allocation
|
page read and write
|
||
1070000
|
trusted library allocation
|
page read and write
|
||
7FF848EF0000
|
trusted library allocation
|
page read and write
|
||
7FF848E80000
|
trusted library allocation
|
page execute and read and write
|
||
273A44C1000
|
trusted library allocation
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
255567C4000
|
heap
|
page read and write
|
||
1AC3DB00000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
273BA9DE000
|
heap
|
page read and write
|
||
25557506000
|
heap
|
page read and write
|
||
255538D1000
|
heap
|
page read and write
|
||
E40000
|
heap
|
page read and write
|
||
25553885000
|
heap
|
page read and write
|
||
273A3A92000
|
trusted library allocation
|
page read and write
|
||
273BADA0000
|
heap
|
page read and write
|
||
25555A3C000
|
heap
|
page read and write
|
||
1AC3DBB6000
|
trusted library allocation
|
page read and write
|
||
2555656D000
|
heap
|
page read and write
|
||
2555396E000
|
heap
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
1633000
|
trusted library allocation
|
page execute and read and write
|
||
2555377C000
|
heap
|
page read and write
|
||
188F000
|
stack
|
page read and write
|
||
1088000
|
heap
|
page read and write
|
||
25553613000
|
heap
|
page read and write
|
||
E1E000
|
stack
|
page read and write
|
||
E75000
|
heap
|
page read and write
|
||
255516EB000
|
heap
|
page read and write
|
||
273A0950000
|
heap
|
page read and write
|
||
273BAB10000
|
heap
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
10B3000
|
trusted library allocation
|
page execute and read and write
|
||
25555985000
|
heap
|
page read and write
|
||
210B7E4C000
|
heap
|
page read and write
|
||
273B2F07000
|
trusted library allocation
|
page read and write
|
||
2555360B000
|
heap
|
page read and write
|
||
1AC3AE50000
|
trusted library allocation
|
page read and write
|
||
1C9275A8000
|
trusted library allocation
|
page read and write
|
||
1C9253F9000
|
heap
|
page read and write
|
||
25557508000
|
heap
|
page read and write
|
||
1AC54EB0000
|
heap
|
page read and write
|
||
7FF848CA3000
|
trusted library allocation
|
page execute and read and write
|
||
1054000
|
trusted library allocation
|
page read and write
|
||
2B990956000
|
heap
|
page read and write
|
||
7FF848CA2000
|
trusted library allocation
|
page read and write
|
||
5E3E000
|
stack
|
page read and write
|
||
5B0F000
|
stack
|
page read and write
|
||
255598DD000
|
heap
|
page read and write
|
||
255565A1000
|
heap
|
page read and write
|
||
255535DB000
|
heap
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
1AC55774000
|
heap
|
page read and write
|
||
2555751C000
|
heap
|
page read and write
|
||
255536E5000
|
heap
|
page read and write
|
||
531B000
|
trusted library allocation
|
page read and write
|
||
129E000
|
stack
|
page read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
1AC3AD9E000
|
heap
|
page read and write
|
||
273B2D35000
|
trusted library allocation
|
page read and write
|
||
255537F5000
|
heap
|
page read and write
|
||
A03A37E000
|
stack
|
page read and write
|
||
1710000
|
heap
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
2555602D000
|
heap
|
page read and write
|
||
96A5F4B000
|
stack
|
page read and write
|
||
5D0E000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
15D3000
|
trusted library allocation
|
page execute and read and write
|
||
25557789000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
1AC54F59000
|
heap
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
2B990BF5000
|
heap
|
page read and write
|
||
7FF849072000
|
trusted library allocation
|
page read and write
|
||
A03B50C000
|
stack
|
page read and write
|
||
2555392E000
|
heap
|
page read and write
|
||
587E000
|
stack
|
page read and write
|
||
1AC3CDB1000
|
trusted library allocation
|
page read and write
|
||
7FF848E60000
|
trusted library allocation
|
page execute and read and write
|
||
1C92351D000
|
heap
|
page read and write
|
||
31B0000
|
heap
|
page execute and read and write
|
||
1AC3DBB1000
|
trusted library allocation
|
page read and write
|
||
273A2920000
|
heap
|
page execute and read and write
|
||
25557544000
|
heap
|
page read and write
|
||
25557586000
|
heap
|
page read and write
|
||
255598ED000
|
heap
|
page read and write
|
||
522E000
|
stack
|
page read and write
|
||
5319000
|
trusted library allocation
|
page read and write
|
||
1AC3CA55000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
1AC3EA3E000
|
trusted library allocation
|
page read and write
|
||
1AC3DB02000
|
trusted library allocation
|
page read and write
|
||
5BE0000
|
heap
|
page execute and read and write
|
||
CA59DCE000
|
stack
|
page read and write
|
||
25553578000
|
heap
|
page read and write
|
||
1C925520000
|
heap
|
page read and write
|
||
1AC55490000
|
heap
|
page read and write
|
||
25557B82000
|
heap
|
page read and write
|
||
210B7DE2000
|
heap
|
page read and write
|
||
EB6000
|
heap
|
page read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
1C93D7AC000
|
heap
|
page read and write
|
||
166E3FE000
|
stack
|
page read and write
|
||
2B9908C0000
|
heap
|
page read and write
|
||
2B992370000
|
heap
|
page read and write
|
||
7FF848DB0000
|
trusted library allocation
|
page execute and read and write
|
||
1480000
|
heap
|
page read and write
|
||
FCB000
|
stack
|
page read and write
|
||
2555396E000
|
heap
|
page read and write
|
||
255536CD000
|
heap
|
page read and write
|
||
1AC3ADC4000
|
heap
|
page read and write
|
||
13F5000
|
heap
|
page read and write
|
||
1690000
|
heap
|
page read and write
|
||
273B2B0B000
|
trusted library allocation
|
page read and write
|
||
25556544000
|
heap
|
page read and write
|
||
5650000
|
heap
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
210B7DD3000
|
heap
|
page read and write
|
||
1C924D20000
|
heap
|
page read and write
|
||
210B7DDC000
|
heap
|
page read and write
|
||
7FF848FE0000
|
trusted library allocation
|
page read and write
|
||
255565A1000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page execute and read and write
|
||
25553901000
|
heap
|
page read and write
|
||
2B990BF0000
|
heap
|
page read and write
|
||
1C9253BF000
|
heap
|
page read and write
|
||
25553779000
|
heap
|
page read and write
|
||
10B4000
|
trusted library allocation
|
page read and write
|
||
7FF849084000
|
trusted library allocation
|
page read and write
|
||
25556531000
|
heap
|
page read and write
|
||
1C9270F7000
|
trusted library allocation
|
page read and write
|
||
562E000
|
stack
|
page read and write
|
||
1C92545A000
|
heap
|
page read and write
|
||
1C9270EE000
|
trusted library allocation
|
page read and write
|
||
582B000
|
trusted library allocation
|
page read and write
|
||
1C924D90000
|
heap
|
page readonly
|
||
273A0A4C000
|
heap
|
page read and write
|
||
E48000
|
heap
|
page read and write
|
||
CA591FE000
|
stack
|
page read and write
|
||
1C9275AE000
|
trusted library allocation
|
page read and write
|
||
25559904000
|
heap
|
page read and write
|
||
25559944000
|
heap
|
page read and write
|
||
210B7DEC000
|
heap
|
page read and write
|
||
1AC4D200000
|
trusted library allocation
|
page read and write
|
||
255535FB000
|
heap
|
page read and write
|
||
25553593000
|
heap
|
page read and write
|
||
1AC3DBB4000
|
trusted library allocation
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
E7E000
|
stack
|
page read and write
|
||
10C0000
|
heap
|
page read and write
|
||
25557586000
|
heap
|
page read and write
|
||
210B7DDE000
|
heap
|
page read and write
|
||
1684000
|
heap
|
page read and write
|
||
7FF848C92000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
210B8030000
|
heap
|
page read and write
|
||
58DD000
|
stack
|
page read and write
|
||
210B7E4C000
|
heap
|
page read and write
|
||
1320000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
16F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848DD0000
|
trusted library allocation
|
page execute and read and write
|
||
273A2795000
|
heap
|
page read and write
|
||
7FF848D40000
|
trusted library allocation
|
page read and write
|
||
255579C2000
|
heap
|
page read and write
|
||
1040000
|
trusted library allocation
|
page read and write
|
||
1AC3AE0F000
|
heap
|
page read and write
|
||
25553917000
|
heap
|
page read and write
|
||
1C925387000
|
heap
|
page read and write
|
||
2B990BFE000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
25556FFE000
|
heap
|
page read and write
|
||
25557587000
|
heap
|
page read and write
|
||
273A29B5000
|
trusted library allocation
|
page read and write
|
||
1AC3CD70000
|
heap
|
page execute and read and write
|
||
5B3E000
|
stack
|
page read and write
|
||
25557889000
|
heap
|
page read and write
|
||
255536F5000
|
heap
|
page read and write
|
||
25556FFF000
|
heap
|
page read and write
|
||
273A0970000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
7FF848E95000
|
trusted library allocation
|
page read and write
|
||
7FF848F10000
|
trusted library allocation
|
page read and write
|
||
1520000
|
heap
|
page read and write
|
||
CA589CF000
|
stack
|
page read and write
|
||
25557514000
|
heap
|
page read and write
|
||
144E000
|
stack
|
page read and write
|
||
25557BEF000
|
heap
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
C5BEAFA000
|
stack
|
page read and write
|
||
1C923330000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
7FF848F40000
|
trusted library allocation
|
page read and write
|
||
255566C5000
|
heap
|
page read and write
|
||
2555396E000
|
heap
|
page read and write
|
||
608F000
|
stack
|
page read and write
|
||
255535EB000
|
heap
|
page read and write
|
||
1C9234D6000
|
heap
|
page read and write
|
||
CA5A00B000
|
stack
|
page read and write
|
||
3138000
|
trusted library allocation
|
page read and write
|
||
1C924EB0000
|
heap
|
page read and write
|
||
5F7E000
|
stack
|
page read and write
|
||
273BAAB0000
|
heap
|
page execute and read and write
|
||
5F30000
|
trusted library allocation
|
page read and write
|
||
5F29000
|
trusted library allocation
|
page read and write
|
||
25557501000
|
heap
|
page read and write
|
||
1AC3CDA0000
|
heap
|
page execute and read and write
|
||
1AC3AE1B000
|
heap
|
page read and write
|
||
1AC3AF65000
|
heap
|
page read and write
|
||
273BAD93000
|
heap
|
page read and write
|
||
255537D5000
|
heap
|
page read and write
|
||
255538C8000
|
heap
|
page read and write
|
||
1C9270F3000
|
trusted library allocation
|
page read and write
|
||
25553705000
|
heap
|
page read and write
|
||
EB0000
|
heap
|
page read and write
|
||
1C9270F5000
|
trusted library allocation
|
page read and write
|
||
25553875000
|
heap
|
page read and write
|
||
25557547000
|
heap
|
page read and write
|
||
1C925370000
|
heap
|
page read and write
|
||
25553771000
|
heap
|
page read and write
|
||
166EBFB000
|
stack
|
page read and write
|
||
5FE0000
|
heap
|
page execute and read and write
|
||
25553729000
|
heap
|
page read and write
|
||
25553936000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
25557503000
|
heap
|
page read and write
|
||
5A2E000
|
stack
|
page read and write
|
||
210B7DF4000
|
heap
|
page read and write
|
||
273A3A84000
|
trusted library allocation
|
page read and write
|
||
7FF8490EB000
|
trusted library allocation
|
page read and write
|
||
1600000
|
trusted library allocation
|
page read and write
|
||
255572FF000
|
heap
|
page read and write
|
||
1AC4D0B2000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
255598EE000
|
heap
|
page read and write
|
||
1AC3AD8A000
|
heap
|
page read and write
|
||
4E3E000
|
stack
|
page read and write
|
||
30FE000
|
stack
|
page read and write
|
||
7FF848E4A000
|
trusted library allocation
|
page read and write
|
||
7DF480AD0000
|
trusted library allocation
|
page execute and read and write
|
||
2B990957000
|
heap
|
page read and write
|
||
25555A24000
|
heap
|
page read and write
|
||
96A4FB9000
|
stack
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
CA58EFE000
|
stack
|
page read and write
|
||
273BA940000
|
heap
|
page read and write
|
||
25553885000
|
heap
|
page read and write
|
||
1347000
|
trusted library allocation
|
page execute and read and write
|
||
1AC3AD7E000
|
heap
|
page read and write
|
||
25556AFE000
|
heap
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
2555170B000
|
heap
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
2555757F000
|
heap
|
page read and write
|
||
593E000
|
stack
|
page read and write
|
||
A03A1FF000
|
stack
|
page read and write
|
||
CF7000
|
stack
|
page read and write
|
||
25553885000
|
heap
|
page read and write
|
||
25557689000
|
heap
|
page read and write
|
||
273A0A38000
|
heap
|
page read and write
|
||
273BAB06000
|
heap
|
page execute and read and write
|
||
33D0000
|
heap
|
page execute and read and write
|
||
1AC3DBA3000
|
trusted library allocation
|
page read and write
|
||
5820000
|
trusted library allocation
|
page read and write
|
||
5864000
|
trusted library allocation
|
page read and write
|
||
5A90000
|
heap
|
page execute and read and write
|
||
25553603000
|
heap
|
page read and write
|
||
134B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848E75000
|
trusted library allocation
|
page read and write
|
||
25553583000
|
heap
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
54DD000
|
stack
|
page read and write
|
||
1660000
|
heap
|
page read and write
|
||
552E000
|
stack
|
page read and write
|
||
19D0000
|
trusted library allocation
|
page read and write
|
||
7FF848E51000
|
trusted library allocation
|
page read and write
|
||
273A4AEE000
|
trusted library allocation
|
page read and write
|
||
25557B63000
|
heap
|
page read and write
|
||
19CC000
|
stack
|
page read and write
|
||
7FF848E41000
|
trusted library allocation
|
page read and write
|
||
25553876000
|
heap
|
page read and write
|
||
7FF849013000
|
trusted library allocation
|
page read and write
|
||
1313000
|
trusted library allocation
|
page read and write
|
||
579E000
|
stack
|
page read and write
|
||
CA59078000
|
stack
|
page read and write
|
||
255535CB000
|
heap
|
page read and write
|
||
CA59178000
|
stack
|
page read and write
|
||
1C93D798000
|
heap
|
page read and write
|
||
2555370D000
|
heap
|
page read and write
|
||
A039DDF000
|
stack
|
page read and write
|
||
273A44C7000
|
trusted library allocation
|
page read and write
|
||
2555363B000
|
heap
|
page read and write
|
||
25557400000
|
heap
|
page read and write
|
||
2B990955000
|
heap
|
page read and write
|
||
25557588000
|
heap
|
page read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
7FF848CD0000
|
trusted library allocation
|
page read and write
|
||
1643000
|
trusted library allocation
|
page read and write
|
||
682000
|
unkown
|
page readonly
|
||
2C90000
|
heap
|
page read and write
|
||
165A000
|
trusted library allocation
|
page execute and read and write
|
||
128B000
|
stack
|
page read and write
|
||
273A09F7000
|
heap
|
page read and write
|
||
273A0ADF000
|
heap
|
page read and write
|
||
255537A5000
|
heap
|
page read and write
|
||
7FF848F80000
|
trusted library allocation
|
page read and write
|
||
273B2951000
|
trusted library allocation
|
page read and write
|
||
7FF848D70000
|
trusted library allocation
|
page execute and read and write
|
||
1AC54F51000
|
heap
|
page read and write
|
||
1698000
|
heap
|
page read and write
|
||
1AC3CCAA000
|
heap
|
page read and write
|
||
273BAD90000
|
heap
|
page read and write
|
||
96A4CFE000
|
stack
|
page read and write
|
||
1C924D60000
|
trusted library allocation
|
page read and write
|
||
166E9FE000
|
stack
|
page read and write
|
||
1C935B06000
|
trusted library allocation
|
page read and write
|
||
5F15000
|
trusted library allocation
|
page read and write
|
||
7FF849190000
|
trusted library allocation
|
page read and write
|
||
255579C5000
|
heap
|
page read and write
|
||
1526000
|
heap
|
page read and write
|
||
12F0000
|
trusted library allocation
|
page read and write
|
||
255537CD000
|
heap
|
page read and write
|
||
7FF848FA0000
|
trusted library allocation
|
page read and write
|
||
CA592FB000
|
stack
|
page read and write
|
||
5EE4000
|
trusted library allocation
|
page read and write
|
||
1AC55770000
|
heap
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1C923450000
|
heap
|
page read and write
|
||
1AC3DD62000
|
trusted library allocation
|
page read and write
|
||
25555B2D000
|
heap
|
page read and write
|
||
96A5C8E000
|
stack
|
page read and write
|
||
CA5927E000
|
stack
|
page read and write
|
||
255535B3000
|
heap
|
page read and write
|
||
1310000
|
heap
|
page execute and read and write
|
||
1280000
|
trusted library allocation
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
25553769000
|
heap
|
page read and write
|
||
5240000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
40A000
|
remote allocation
|
page execute and read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
1387000
|
stack
|
page read and write
|
||
168A000
|
heap
|
page read and write
|
||
255598DB000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
FFE000
|
stack
|
page read and write
|
||
2B990973000
|
heap
|
page read and write
|
||
96A4DFD000
|
stack
|
page read and write
|
||
7FF8490F0000
|
trusted library allocation
|
page read and write
|
||
210B7DD6000
|
heap
|
page read and write
|
||
1C93D738000
|
heap
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
7FF848F90000
|
trusted library allocation
|
page read and write
|
||
7FF848FE3000
|
trusted library allocation
|
page read and write
|
||
210B7DCF000
|
heap
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
255516C9000
|
heap
|
page read and write
|
||
7FF848ED0000
|
trusted library allocation
|
page read and write
|
||
255538EB000
|
heap
|
page read and write
|
||
210B7DF4000
|
heap
|
page read and write
|
||
273BA948000
|
heap
|
page read and write
|
||
1AC3CCB0000
|
heap
|
page read and write
|
||
132A000
|
trusted library allocation
|
page execute and read and write
|
||
2555176D000
|
heap
|
page read and write
|
||
273BADC2000
|
heap
|
page read and write
|
||
255536FD000
|
heap
|
page read and write
|
||
56AD000
|
stack
|
page read and write
|
||
2555171C000
|
heap
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
1340000
|
heap
|
page read and write
|
||
1C925378000
|
heap
|
page read and write
|
||
2555359B000
|
heap
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
96A52BB000
|
stack
|
page read and write
|
||
210B7DBE000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
1C924EB5000
|
heap
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
25558780000
|
heap
|
page read and write
|
||
1AC3CE30000
|
trusted library allocation
|
page read and write
|
||
7FF8491A0000
|
trusted library allocation
|
page read and write
|
||
CA590F8000
|
stack
|
page read and write
|
||
25555F2C000
|
heap
|
page read and write
|
||
4DDE000
|
stack
|
page read and write
|
||
2CA8000
|
trusted library allocation
|
page read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
2555389B000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
25557932000
|
heap
|
page read and write
|
||
7FF849130000
|
trusted library allocation
|
page read and write
|
||
7FF848EC0000
|
trusted library allocation
|
page read and write
|
||
255535AB000
|
heap
|
page read and write
|
||
255516CE000
|
heap
|
page read and write
|
||
33E1000
|
trusted library allocation
|
page read and write
|
||
CA58D7E000
|
stack
|
page read and write
|
||
7FF848C90000
|
trusted library allocation
|
page read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
25553799000
|
heap
|
page read and write
|
||
1C92660F000
|
trusted library allocation
|
page read and write
|
||
2555367D000
|
heap
|
page read and write
|
||
1AC3D1FF000
|
trusted library allocation
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
160A000
|
trusted library allocation
|
page execute and read and write
|
||
1330000
|
heap
|
page read and write
|
||
7FF848FD0000
|
trusted library allocation
|
page read and write
|
||
2B990959000
|
heap
|
page read and write
|
||
96A51BE000
|
stack
|
page read and write
|
||
1C927584000
|
trusted library allocation
|
page read and write
|
||
25557586000
|
heap
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
25557539000
|
heap
|
page read and write
|
||
1C93D7B8000
|
heap
|
page read and write
|
||
2555365B000
|
heap
|
page read and write
|
||
1C92539E000
|
heap
|
page read and write
|
||
1AC55400000
|
heap
|
page read and write
|
||
1385000
|
heap
|
page read and write
|
||
2555172D000
|
heap
|
page read and write
|
||
210B7DB8000
|
heap
|
page read and write
|
||
25553936000
|
heap
|
page read and write
|
||
7FF849000000
|
trusted library allocation
|
page read and write
|
||
96A4AFE000
|
stack
|
page read and write
|
||
185F000
|
stack
|
page read and write
|
||
1C93D73F000
|
heap
|
page read and write
|
||
2555612D000
|
heap
|
page read and write
|
||
4D3C000
|
stack
|
page read and write
|
||
210B7DB8000
|
heap
|
page read and write
|
||
7FF848CBB000
|
trusted library allocation
|
page read and write
|
||
210B7DBE000
|
heap
|
page read and write
|
||
1AC3E7E2000
|
trusted library allocation
|
page read and write
|
||
2555392E000
|
heap
|
page read and write
|
||
1AC3D1FB000
|
trusted library allocation
|
page read and write
|
||
A03A6FF000
|
stack
|
page read and write
|
||
5829000
|
trusted library allocation
|
page read and write
|
||
2B990900000
|
heap
|
page read and write
|
||
2555357B000
|
heap
|
page read and write
|
||
255577F1000
|
heap
|
page read and write
|
||
25557201000
|
heap
|
page read and write
|
||
273BADFD000
|
heap
|
page read and write
|
||
25553911000
|
heap
|
page read and write
|
||
A03A67D000
|
stack
|
page read and write
|
||
25557A9F000
|
heap
|
page read and write
|
||
CA58F7D000
|
stack
|
page read and write
|
||
25557639000
|
heap
|
page read and write
|
||
DBB000
|
stack
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
42C1000
|
trusted library allocation
|
page read and write
|
||
1AC3AEC0000
|
trusted library allocation
|
page read and write
|
||
1060000
|
trusted library allocation
|
page read and write
|
||
210B7E58000
|
heap
|
page read and write
|
||
1C935CE7000
|
trusted library allocation
|
page read and write
|
||
25553936000
|
heap
|
page read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
210B7D80000
|
heap
|
page read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
5A5F000
|
stack
|
page read and write
|
||
1C93DA83000
|
heap
|
page read and write
|
||
1C93D734000
|
heap
|
page read and write
|
||
25555931000
|
heap
|
page read and write
|
||
2B99095B000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
7FF848CB0000
|
trusted library allocation
|
page read and write
|
||
255536B5000
|
heap
|
page read and write
|
||
210B7E3D000
|
heap
|
page read and write
|
||
255567C5000
|
heap
|
page read and write
|
||
198F000
|
stack
|
page read and write
|
||
1AC3AD48000
|
heap
|
page read and write
|
||
25557544000
|
heap
|
page read and write
|
||
25553653000
|
heap
|
page read and write
|
||
255538B8000
|
heap
|
page read and write
|
||
25559335000
|
heap
|
page read and write
|
||
7FF848D6C000
|
trusted library allocation
|
page execute and read and write
|
||
25556DFE000
|
heap
|
page read and write
|
||
25557531000
|
heap
|
page read and write
|
||
2BE0000
|
trusted library allocation
|
page read and write
|
||
2F60000
|
trusted library allocation
|
page read and write
|
||
25556579000
|
heap
|
page read and write
|
||
2B9907E0000
|
heap
|
page read and write
|
||
7FF848CAD000
|
trusted library allocation
|
page execute and read and write
|
||
1AC3AD20000
|
heap
|
page read and write
|
||
1640000
|
trusted library allocation
|
page read and write
|
||
1AC3CBC0000
|
heap
|
page read and write
|
||
2555612E000
|
heap
|
page read and write
|
||
1AC4D210000
|
trusted library allocation
|
page read and write
|
||
7FF848EB0000
|
trusted library allocation
|
page read and write
|
||
255536ED000
|
heap
|
page read and write
|
||
25556589000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
210B7DB8000
|
heap
|
page read and write
|
||
255516DA000
|
heap
|
page read and write
|
||
273A23C0000
|
trusted library allocation
|
page read and write
|
||
CA59D4F000
|
stack
|
page read and write
|
||
7FF848C9D000
|
trusted library allocation
|
page execute and read and write
|
||
2555396E000
|
heap
|
page read and write
|
||
2555652E000
|
heap
|
page read and write
|
||
25553623000
|
heap
|
page read and write
|
||
2B990936000
|
heap
|
page read and write
|
||
25557589000
|
heap
|
page read and write
|
||
1C925340000
|
heap
|
page execute and read and write
|
||
1C923550000
|
heap
|
page read and write
|
||
210B7DED000
|
heap
|
page read and write
|
||
C5BEFFE000
|
stack
|
page read and write
|
||
255538F2000
|
heap
|
page read and write
|
||
5320000
|
heap
|
page read and write
|
||
273BA985000
|
heap
|
page read and write
|
||
1C925FCB000
|
trusted library allocation
|
page read and write
|
||
125E000
|
stack
|
page read and write
|
||
96A4EBF000
|
stack
|
page read and write
|
||
1C9234D8000
|
heap
|
page read and write
|
||
A03A577000
|
stack
|
page read and write
|
||
255565A6000
|
heap
|
page read and write
|
||
1C935541000
|
trusted library allocation
|
page read and write
|
||
1AC54F3C000
|
heap
|
page read and write
|
||
A03A7FF000
|
stack
|
page read and write
|
||
1C925FB0000
|
trusted library allocation
|
page read and write
|
||
16E5000
|
heap
|
page read and write
|
||
96A4E78000
|
stack
|
page read and write
|
||
1668000
|
heap
|
page read and write
|
||
25551768000
|
heap
|
page read and write
|
||
154F000
|
stack
|
page read and write
|
||
273A2445000
|
heap
|
page read and write
|
||
255568FC000
|
heap
|
page read and write
|
||
1AC55170000
|
heap
|
page read and write
|
||
1AC4CE21000
|
trusted library allocation
|
page read and write
|
||
1053000
|
trusted library allocation
|
page execute and read and write
|
||
306E000
|
stack
|
page read and write
|
||
C5BF1FE000
|
stack
|
page read and write
|
||
7FF848CA0000
|
trusted library allocation
|
page read and write
|
||
2555755F000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page execute and read and write
|
||
1C92348E000
|
heap
|
page read and write
|
||
255538C8000
|
heap
|
page read and write
|
||
25555A24000
|
heap
|
page read and write
|
||
1AC3D964000
|
trusted library allocation
|
page read and write
|
||
1C93DBB0000
|
heap
|
page read and write
|
||
1C9255C2000
|
trusted library allocation
|
page read and write
|
||
5FBE000
|
stack
|
page read and write
|
||
A03A17E000
|
stack
|
page read and write
|
||
16D8000
|
heap
|
page read and write
|
||
166E5FF000
|
stack
|
page read and write
|
||
1372000
|
heap
|
page read and write
|
||
273A2400000
|
trusted library allocation
|
page read and write
|
||
25553781000
|
heap
|
page read and write
|
||
210B7DCE000
|
heap
|
page read and write
|
||
25557572000
|
heap
|
page read and write
|
||
1AC3CBD0000
|
heap
|
page read and write
|
||
7FF848E9A000
|
trusted library allocation
|
page read and write
|
||
25554BD3000
|
heap
|
page read and write
|
||
12B0000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
210B7DB8000
|
heap
|
page read and write
|
||
2555877B000
|
heap
|
page read and write
|
||
210B7DED000
|
heap
|
page read and write
|
||
210B803E000
|
heap
|
page read and write
|
||
7FF848FB0000
|
trusted library allocation
|
page read and write
|
||
273BAE0E000
|
heap
|
page read and write
|
||
3CA1000
|
trusted library allocation
|
page read and write
|
||
7FF848F20000
|
trusted library allocation
|
page read and write
|
||
FBF000
|
stack
|
page read and write
|
||
E64000
|
heap
|
page read and write
|
||
25556DFF000
|
heap
|
page read and write
|
||
1AC3CC16000
|
heap
|
page read and write
|
||
1AC54DD0000
|
heap
|
page read and write
|
||
25551668000
|
heap
|
page read and write
|
||
1C926611000
|
trusted library allocation
|
page read and write
|
||
255535D3000
|
heap
|
page read and write
|
||
255565C4000
|
heap
|
page read and write
|
||
1C935A30000
|
trusted library allocation
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
32C8000
|
trusted library allocation
|
page read and write
|
||
58B0000
|
trusted library allocation
|
page read and write
|
||
96A513E000
|
stack
|
page read and write
|
||
210B7DBE000
|
heap
|
page read and write
|
||
96A50BF000
|
stack
|
page read and write
|
||
2555642E000
|
heap
|
page read and write
|
||
128B000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848CCB000
|
trusted library allocation
|
page read and write
|
||
255538F2000
|
heap
|
page read and write
|
||
7FF848CEC000
|
trusted library allocation
|
page execute and read and write
|
||
5C3F000
|
stack
|
page read and write
|
||
16C7000
|
heap
|
page read and write
|
||
1AC3D214000
|
trusted library allocation
|
page read and write
|
||
2555754F000
|
heap
|
page read and write
|
||
1AC3CCF6000
|
heap
|
page execute and read and write
|
||
25553643000
|
heap
|
page read and write
|
||
210B7DF4000
|
heap
|
page read and write
|
||
25557525000
|
heap
|
page read and write
|
||
1C925530000
|
heap
|
page execute and read and write
|
||
273A33C0000
|
trusted library allocation
|
page read and write
|
||
25557300000
|
heap
|
page read and write
|
||
166E6FF000
|
stack
|
page read and write
|
||
1C923458000
|
heap
|
page read and write
|
||
25557688000
|
heap
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
25555A25000
|
heap
|
page read and write
|
||
7FF849180000
|
trusted library allocation
|
page read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
5DBE000
|
stack
|
page read and write
|
||
255537C5000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
2B9926C0000
|
heap
|
page read and write
|
||
255598CA000
|
heap
|
page read and write
|
||
16EC000
|
stack
|
page read and write
|
||
1C926870000
|
trusted library allocation
|
page read and write
|
||
255538EB000
|
heap
|
page read and write
|
||
2555358B000
|
heap
|
page read and write
|
||
2555642D000
|
heap
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
2B990973000
|
heap
|
page read and write
|
||
7FF848F60000
|
trusted library allocation
|
page read and write
|
||
25558782000
|
heap
|
page read and write
|
||
1AC3D4CA000
|
trusted library allocation
|
page read and write
|
||
255535E3000
|
heap
|
page read and write
|
||
273BB320000
|
heap
|
page read and write
|
||
7FF849100000
|
trusted library allocation
|
page read and write
|
||
10AB000
|
heap
|
page read and write
|
||
25557520000
|
heap
|
page read and write
|
||
273A35ED000
|
trusted library allocation
|
page read and write
|
||
7FF848FF0000
|
trusted library allocation
|
page read and write
|
||
25557870000
|
heap
|
page read and write
|
||
7FF848CC0000
|
trusted library allocation
|
page read and write
|
||
25557563000
|
heap
|
page read and write
|
||
2555753D000
|
heap
|
page read and write
|
||
255578BD000
|
heap
|
page read and write
|
||
273A43C1000
|
trusted library allocation
|
page read and write
|
||
CA58982000
|
stack
|
page read and write
|
||
273BB440000
|
heap
|
page read and write
|
||
CA59F8E000
|
stack
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
2555632D000
|
heap
|
page read and write
|
||
1AC3ABC0000
|
heap
|
page read and write
|
||
273A2941000
|
trusted library allocation
|
page read and write
|
||
25558890000
|
remote allocation
|
page read and write
|
||
7FF848CBD000
|
trusted library allocation
|
page execute and read and write
|
||
15C0000
|
trusted library allocation
|
page read and write
|
||
25555FC5000
|
heap
|
page read and write
|
||
210B7DD5000
|
heap
|
page read and write
|
||
1C935935000
|
trusted library allocation
|
page read and write
|
||
1C93DF50000
|
heap
|
page read and write
|
||
96A503C000
|
stack
|
page read and write
|
||
68A000
|
unkown
|
page readonly
|
||
7FF849150000
|
trusted library allocation
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
273BB360000
|
heap
|
page read and write
|
||
1AC3EB03000
|
trusted library allocation
|
page read and write
|
||
1C924D80000
|
trusted library allocation
|
page read and write
|
||
273A44C9000
|
trusted library allocation
|
page read and write
|
||
2555368D000
|
heap
|
page read and write
|
||
7FF848CA4000
|
trusted library allocation
|
page read and write
|
||
25556CFD000
|
heap
|
page read and write
|
||
25556BFE000
|
heap
|
page read and write
|
||
2CA1000
|
trusted library allocation
|
page read and write
|
||
25557523000
|
heap
|
page read and write
|
||
57AE000
|
stack
|
page read and write
|
||
1060000
|
heap
|
page read and write
|
||
25556EFF000
|
heap
|
page read and write
|
||
25555B2C000
|
heap
|
page read and write
|
||
255538EB000
|
heap
|
page read and write
|
||
585E000
|
stack
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
255536BD000
|
heap
|
page read and write
|
||
25553900000
|
heap
|
page read and write
|
||
1C925405000
|
heap
|
page read and write
|
||
A03A5F8000
|
stack
|
page read and write
|
||
111C000
|
heap
|
page read and write
|
||
EB8000
|
heap
|
page read and write
|
||
575E000
|
stack
|
page read and write
|
||
273A39E3000
|
trusted library allocation
|
page read and write
|
||
5905000
|
trusted library allocation
|
page read and write
|
||
273BAB30000
|
heap
|
page read and write
|
||
5310000
|
trusted library allocation
|
page read and write
|
||
273A0A34000
|
heap
|
page read and write
|
||
255568FD000
|
heap
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
25557ADF000
|
heap
|
page read and write
|
||
25557529000
|
heap
|
page read and write
|
||
7FF848E90000
|
trusted library allocation
|
page read and write
|
||
25553731000
|
heap
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
1C93D74B000
|
heap
|
page read and write
|
||
255598FF000
|
heap
|
page read and write
|
||
5C70000
|
trusted library allocation
|
page read and write
|
||
1C924DD0000
|
trusted library allocation
|
page read and write
|
||
273A2370000
|
trusted library allocation
|
page read and write
|
||
2555622D000
|
heap
|
page read and write
|
||
25553939000
|
heap
|
page read and write
|
||
7FF849110000
|
trusted library allocation
|
page read and write
|
||
273A33CC000
|
trusted library allocation
|
page read and write
|
||
2555750C000
|
heap
|
page read and write
|
||
210B7DAC000
|
heap
|
page read and write
|
||
273BAE0B000
|
heap
|
page read and write
|
||
2B9909C0000
|
heap
|
page read and write
|
||
25553917000
|
heap
|
page read and write
|
||
25556599000
|
heap
|
page read and write
|
||
25556804000
|
heap
|
page read and write
|
||
1AC3DBB8000
|
trusted library allocation
|
page read and write
|
||
2AC0000
|
trusted library allocation
|
page read and write
|
||
210B7DB1000
|
heap
|
page read and write
|
||
160E000
|
stack
|
page read and write
|
||
2B9909BF000
|
heap
|
page read and write
|
||
53BE000
|
stack
|
page read and write
|
||
1379000
|
heap
|
page read and write
|
||
273A4981000
|
trusted library allocation
|
page read and write
|
||
12F7000
|
stack
|
page read and write
|
||
25556539000
|
heap
|
page read and write
|
||
255516FC000
|
heap
|
page read and write
|
||
C5BF3FF000
|
stack
|
page read and write
|
||
25555C2C000
|
heap
|
page read and write
|
||
210B7DCF000
|
heap
|
page read and write
|
||
7FF848C94000
|
trusted library allocation
|
page read and write
|
||
7FF8491B0000
|
trusted library allocation
|
page read and write
|
||
255535A3000
|
heap
|
page read and write
|
||
1304000
|
trusted library allocation
|
page read and write
|
||
25559944000
|
heap
|
page read and write
|
||
273A0A73000
|
heap
|
page read and write
|
||
1C923410000
|
heap
|
page read and write
|
||
273A0A03000
|
heap
|
page read and write
|
||
2555369D000
|
heap
|
page read and write
|
||
7FF849140000
|
trusted library allocation
|
page read and write
|
||
1C93570B000
|
trusted library allocation
|
page read and write
|
||
2AA7000
|
trusted library allocation
|
page execute and read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
7FF848D0C000
|
trusted library allocation
|
page execute and read and write
|
||
1AC3AD5F000
|
heap
|
page read and write
|
||
25553940000
|
heap
|
page read and write
|
||
3007000
|
trusted library allocation
|
page execute and read and write
|
||
A03A3FE000
|
stack
|
page read and write
|
||
255565AB000
|
heap
|
page read and write
|
||
25557557000
|
heap
|
page read and write
|
||
1C923445000
|
heap
|
page read and write
|
||
25553695000
|
heap
|
page read and write
|
||
572E000
|
stack
|
page read and write
|
||
273A2380000
|
heap
|
page readonly
|
||
96A47C3000
|
stack
|
page read and write
|
||
25553809000
|
heap
|
page read and write
|
||
12D3000
|
trusted library allocation
|
page read and write
|
||
43E1000
|
trusted library allocation
|
page read and write
|
||
210B7DB6000
|
heap
|
page read and write
|
||
7FF848D66000
|
trusted library allocation
|
page read and write
|
||
A03A4F9000
|
stack
|
page read and write
|
||
2555386E000
|
heap
|
page read and write
|
||
273BB3A0000
|
heap
|
page read and write
|
||
5E65000
|
trusted library allocation
|
page read and write
|
||
7FF848D60000
|
trusted library allocation
|
page read and write
|
||
5F2B000
|
trusted library allocation
|
page read and write
|
||
1AC3AD82000
|
heap
|
page read and write
|
||
25553751000
|
heap
|
page read and write
|
||
25553917000
|
heap
|
page read and write
|
||
1C926FEB000
|
trusted library allocation
|
page read and write
|
||
CA59F0E000
|
stack
|
page read and write
|
||
15E3000
|
trusted library allocation
|
page read and write
|
||
30BE000
|
stack
|
page read and write
|
||
7FF848E70000
|
trusted library allocation
|
page execute and read and write
|
||
255538D5000
|
heap
|
page read and write
|
||
273BADB9000
|
heap
|
page read and write
|
||
25557586000
|
heap
|
page read and write
|
||
273A44C5000
|
trusted library allocation
|
page read and write
|
||
255538F2000
|
heap
|
page read and write
|
||
255569FD000
|
heap
|
page read and write
|
||
25558699000
|
heap
|
page read and write
|
||
1AC3D1DE000
|
trusted library allocation
|
page read and write
|
||
25553633000
|
heap
|
page read and write
|
||
255538C0000
|
heap
|
page read and write
|
||
96A4D7E000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
1C923464000
|
heap
|
page read and write
|
||
4131000
|
trusted library allocation
|
page read and write
|
||
1C93D6B0000
|
heap
|
page read and write
|
||
1AC4CDBF000
|
trusted library allocation
|
page read and write
|
||
7FF848F50000
|
trusted library allocation
|
page read and write
|
||
CA58DFD000
|
stack
|
page read and write
|
||
1C924E10000
|
trusted library allocation
|
page read and write
|
||
255538EB000
|
heap
|
page read and write
|
||
1AC3CCBA000
|
heap
|
page read and write
|
||
A03B48D000
|
stack
|
page read and write
|
||
7FF849120000
|
trusted library allocation
|
page read and write
|
||
166DF4A000
|
stack
|
page read and write
|
||
7FF848E50000
|
trusted library allocation
|
page read and write
|
||
1C927399000
|
trusted library allocation
|
page read and write
|
||
96A5D0E000
|
stack
|
page read and write
|
||
7FF8490E0000
|
trusted library allocation
|
page read and write
|
||
25557523000
|
heap
|
page read and write
|
||
210B9E40000
|
heap
|
page read and write
|
||
255516C2000
|
heap
|
page read and write
|
||
1080000
|
heap
|
page read and write
|
||
210B8020000
|
heap
|
page read and write
|
||
5895000
|
trusted library allocation
|
page read and write
|
||
2555364B000
|
heap
|
page read and write
|
||
210B7DB1000
|
heap
|
page read and write
|
||
1310000
|
trusted library allocation
|
page read and write
|
||
25556561000
|
heap
|
page read and write
|
||
273A2930000
|
heap
|
page read and write
|
||
273BB310000
|
heap
|
page read and write
|
||
10A2000
|
heap
|
page read and write
|
||
2555602C000
|
heap
|
page read and write
|
||
2B99095F000
|
heap
|
page read and write
|
||
255587A0000
|
heap
|
page read and write
|
||
1C925FCF000
|
trusted library allocation
|
page read and write
|
||
273A0930000
|
heap
|
page read and write
|
||
2B990951000
|
heap
|
page read and write
|
||
1287000
|
trusted library allocation
|
page execute and read and write
|
||
14A0000
|
heap
|
page read and write
|
||
25556544000
|
heap
|
page read and write
|
||
1AC3ACA0000
|
heap
|
page read and write
|
||
273A34F2000
|
trusted library allocation
|
page read and write
|
||
25553685000
|
heap
|
page read and write
|
||
2B990960000
|
heap
|
page read and write
|
||
2BF0000
|
heap
|
page execute and read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
1AC3AD00000
|
heap
|
page read and write
|
||
25557518000
|
heap
|
page read and write
|
||
1AC3E442000
|
trusted library allocation
|
page read and write
|
||
CA5937B000
|
stack
|
page read and write
|
||
210B7DD5000
|
heap
|
page read and write
|
||
7FF8490DB000
|
trusted library allocation
|
page read and write
|
||
255536DD000
|
heap
|
page read and write
|
||
1AC3AD25000
|
heap
|
page read and write
|
||
273A33D0000
|
trusted library allocation
|
page read and write
|
||
1AC54F15000
|
heap
|
page read and write
|
||
25553721000
|
heap
|
page read and write
|
||
7FF848EA0000
|
trusted library allocation
|
page read and write
|
||
1C93DA80000
|
heap
|
page read and write
|
||
7FF848E40000
|
trusted library allocation
|
page read and write
|
||
2555376C000
|
heap
|
page read and write
|
||
1340000
|
trusted library allocation
|
page read and write
|
||
1450000
|
heap
|
page read and write
|
||
E80000
|
heap
|
page read and write
|
||
19F0000
|
trusted library allocation
|
page read and write
|
||
25557AA2000
|
heap
|
page read and write
|
||
7FF848FF3000
|
trusted library allocation
|
page read and write
|
||
1AC3D3CD000
|
trusted library allocation
|
page read and write
|
||
273BAB00000
|
heap
|
page execute and read and write
|
||
273A0920000
|
heap
|
page read and write
|
||
25553936000
|
heap
|
page read and write
|
||
55AD000
|
stack
|
page read and write
|
||
A03A47D000
|
stack
|
page read and write
|
||
D60000
|
heap
|
page read and write
|
||
E30000
|
heap
|
page read and write
|
||
CA58FF9000
|
stack
|
page read and write
|
||
273A09F0000
|
heap
|
page read and write
|
||
1C9266BF000
|
trusted library allocation
|
page read and write
|
||
5C55000
|
trusted library allocation
|
page read and write
|
||
A03B2CE000
|
stack
|
page read and write
|
||
2B99092F000
|
heap
|
page read and write
|
||
C6B000
|
stack
|
page read and write
|
||
2555877B000
|
heap
|
page read and write
|
||
1617000
|
trusted library allocation
|
page execute and read and write
|
||
58E0000
|
heap
|
page execute and read and write
|
||
1AC3AE90000
|
trusted library allocation
|
page read and write
|
||
5C6B000
|
trusted library allocation
|
page read and write
|
||
210B7DAD000
|
heap
|
page read and write
|
||
CA58C7D000
|
stack
|
page read and write
|
||
172C000
|
heap
|
page read and write
|
||
19E0000
|
heap
|
page read and write
|
||
150D000
|
stack
|
page read and write
|
||
25556549000
|
heap
|
page read and write
|
||
5CBE000
|
stack
|
page read and write
|
||
5EBE000
|
stack
|
page read and write
|
||
A03A87B000
|
stack
|
page read and write
|
||
7FF848D50000
|
trusted library allocation
|
page read and write
|
||
25557204000
|
heap
|
page read and write
|
||
30AC000
|
stack
|
page read and write
|
||
7FF848F00000
|
trusted library allocation
|
page read and write
|
||
7FF848F30000
|
trusted library allocation
|
page read and write
|
||
58B9000
|
trusted library allocation
|
page read and write
|
||
1AC3D1ED000
|
trusted library allocation
|
page read and write
|
||
255537ED000
|
heap
|
page read and write
|
||
25553573000
|
heap
|
page read and write
|
||
7FF848F70000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
1C92576D000
|
trusted library allocation
|
page read and write
|
||
210B7F50000
|
heap
|
page read and write
|
||
273A476C000
|
trusted library allocation
|
page read and write
|
||
C5BEBFE000
|
stack
|
page read and write
|
||
1AC55150000
|
heap
|
page read and write
|
||
A03B38F000
|
stack
|
page read and write
|
||
1330000
|
heap
|
page read and write
|
||
1AC55173000
|
heap
|
page read and write
|
||
7FF848FC0000
|
trusted library allocation
|
page read and write
|
||
96A5DCE000
|
stack
|
page read and write
|
||
A03B34D000
|
stack
|
page read and write
|
||
7FF848EE0000
|
trusted library allocation
|
page read and write
|
||
51FE000
|
stack
|
page read and write
|
||
210B7DF4000
|
heap
|
page read and write
|
||
11CF000
|
stack
|
page read and write
|
||
127F000
|
stack
|
page read and write
|
||
7FF849160000
|
trusted library allocation
|
page read and write
|
||
25555BA5000
|
heap
|
page read and write
|
||
2B990973000
|
heap
|
page read and write
|
||
15D4000
|
trusted library allocation
|
page read and write
|
||
1AC3AE80000
|
heap
|
page readonly
|
||
96A4F37000
|
stack
|
page read and write
|
||
518E000
|
stack
|
page read and write
|
||
255516EB000
|
heap
|
page read and write
|
||
255537B5000
|
heap
|
page read and write
|
||
273B29B2000
|
trusted library allocation
|
page read and write
|
||
273A0A2C000
|
heap
|
page read and write
|
||
25557CEF000
|
heap
|
page read and write
|
||
25553900000
|
heap
|
page read and write
|
||
12F0000
|
heap
|
page read and write
|
||
273A33B0000
|
trusted library allocation
|
page read and write
|
||
25553902000
|
heap
|
page read and write
|
||
1063000
|
trusted library allocation
|
page read and write
|
||
1C93DA60000
|
heap
|
page read and write
|
||
1104000
|
heap
|
page read and write
|
||
273A4957000
|
trusted library allocation
|
page read and write
|
||
1AC3AF00000
|
trusted library allocation
|
page read and write
|
||
255538F2000
|
heap
|
page read and write
|
||
25557523000
|
heap
|
page read and write
|
||
273B2E30000
|
trusted library allocation
|
page read and write
|
||
25557544000
|
heap
|
page read and write
|
||
7FF848C93000
|
trusted library allocation
|
page execute and read and write
|
There are 1265 hidden memdumps, click here to show them.